Resubmissions

22-10-2024 02:07

241022-cka1nssfkj 10

Analysis

  • max time kernel
    149s
  • max time network
    147s
  • platform
    ubuntu-22.04_amd64
  • resource
    ubuntu2204-amd64-20240522.1-en
  • resource tags

    arch:amd64arch:i386image:ubuntu2204-amd64-20240522.1-enkernel:5.15.0-105-genericlocale:en-usos:ubuntu-22.04-amd64system
  • submitted
    22-10-2024 02:07

General

  • Target

    The-MALWARE-Repo-master/Botnets/FritzFrog/d1e82d4a37959a9e6b661e31b8c8c6d2813c93ac92508a2771b2491b04ea2485

  • Size

    8.7MB

  • MD5

    aa55272ad8db954381a8eab889f087cf

  • SHA1

    d7df26bf57530c0475247b0f3335e5d19d9cb30d

  • SHA256

    d1e82d4a37959a9e6b661e31b8c8c6d2813c93ac92508a2771b2491b04ea2485

  • SHA512

    5590c039eb50708fe8fe417a5b5adf1d9019db0590dee119d0907bb588114bcbeb980c5ec7f3f77e85aefcbba76c1560e8b81069434ef5774ca60b1e28dbac20

  • SSDEEP

    98304:WjLz0rgRnuINVhcBSTDQaQqfViO7tauT8Xu4RM7Xk:WjLz0rgRXVzP5QkViitauT8Y

Malware Config

Signatures

  • Adds new SSH keys 1 TTPs 1 IoCs

    Linux special file to hold SSH keys. The threat actor may add new keys for further remote access.

  • Deletes itself 1 IoCs
  • Deletes log files 1 TTPs 1 IoCs

    Deletes log files on the system.

  • Enumerates running processes

    Discovers information about currently running processes on the system

  • Virtualization/Sandbox Evasion: Time Based Evasion 1 TTPs 15 IoCs

    Adversaries may detect and evade virtualized environments and sandboxes.

  • Checks CPU configuration 1 TTPs 1 IoCs

    Checks CPU information which indicate if the system is a virtual machine.

  • Reads CPU attributes 1 TTPs 30 IoCs
  • Reads runtime system information 64 IoCs

    Reads data from /proc virtual filesystem.

  • System Network Configuration Discovery 1 TTPs 4 IoCs

    Adversaries may gather information about the network configuration of a system.

  • Writes file to tmp directory 1 IoCs

    Malware often drops required files in the /tmp directory.

Processes

  • /tmp/The-MALWARE-Repo-master/Botnets/FritzFrog/d1e82d4a37959a9e6b661e31b8c8c6d2813c93ac92508a2771b2491b04ea2485
    /tmp/The-MALWARE-Repo-master/Botnets/FritzFrog/d1e82d4a37959a9e6b661e31b8c8c6d2813c93ac92508a2771b2491b04ea2485
    1⤵
    • Adds new SSH keys
    • Deletes itself
    • Deletes log files
    • Reads runtime system information
    • Writes file to tmp directory
    PID:1570
    • /usr/bin/uname
      uname -a
      2⤵
        PID:1581
      • /usr/bin/cat
        cat /proc/cpuinfo
        2⤵
        • Checks CPU configuration
        PID:1585
      • /usr/bin/cat
        cat /etc/issue
        2⤵
          PID:1586
        • /usr/bin/free
          free -m
          2⤵
          • Reads CPU attributes
          PID:1587
        • /usr/bin/uptime
          uptime
          2⤵
          • Virtualization/Sandbox Evasion: Time Based Evasion
          • Reads CPU attributes
          PID:1588
        • /usr/bin/journalctl
          journalctl -S "@0" -u sshd
          2⤵
          • Reads runtime system information
          PID:1589
        • /usr/bin/cat
          cat "/var/log/auth*"
          2⤵
            PID:1590
          • /usr/bin/zcat
            zcat "/var/log/auth*"
            2⤵
              PID:1591
            • /usr/local/sbin/gzip
              gzip -cd "/var/log/auth*"
              2⤵
              • System Network Configuration Discovery
              PID:1591
            • /usr/local/bin/gzip
              gzip -cd "/var/log/auth*"
              2⤵
              • System Network Configuration Discovery
              PID:1591
            • /usr/sbin/gzip
              gzip -cd "/var/log/auth*"
              2⤵
              • System Network Configuration Discovery
              PID:1591
            • /usr/bin/gzip
              gzip -cd "/var/log/auth*"
              2⤵
              • System Network Configuration Discovery
              PID:1591
            • /usr/bin/free
              free -m
              2⤵
              • Reads CPU attributes
              PID:1592
            • /usr/bin/uptime
              uptime
              2⤵
              • Virtualization/Sandbox Evasion: Time Based Evasion
              • Reads CPU attributes
              • Reads runtime system information
              PID:1593
            • /usr/bin/free
              free -m
              2⤵
              • Reads CPU attributes
              PID:1594
            • /usr/bin/uptime
              uptime
              2⤵
              • Virtualization/Sandbox Evasion: Time Based Evasion
              • Reads CPU attributes
              PID:1595
            • /usr/bin/free
              free -m
              2⤵
              • Reads CPU attributes
              • Reads runtime system information
              PID:1598
            • /usr/bin/uptime
              uptime
              2⤵
              • Virtualization/Sandbox Evasion: Time Based Evasion
              • Reads CPU attributes
              • Reads runtime system information
              PID:1599
            • /usr/bin/free
              free -m
              2⤵
              • Reads CPU attributes
              PID:1600
            • /usr/bin/uptime
              uptime
              2⤵
              • Virtualization/Sandbox Evasion: Time Based Evasion
              • Reads CPU attributes
              • Reads runtime system information
              PID:1601
            • /usr/bin/free
              free -m
              2⤵
              • Reads CPU attributes
              • Reads runtime system information
              PID:1602
            • /usr/bin/uptime
              uptime
              2⤵
              • Virtualization/Sandbox Evasion: Time Based Evasion
              • Reads CPU attributes
              PID:1603
            • /usr/bin/free
              free -m
              2⤵
              • Reads CPU attributes
              PID:1604
            • /usr/bin/uptime
              uptime
              2⤵
              • Virtualization/Sandbox Evasion: Time Based Evasion
              • Reads CPU attributes
              • Reads runtime system information
              PID:1605
            • /usr/bin/free
              free -m
              2⤵
              • Reads CPU attributes
              PID:1606
            • /usr/bin/uptime
              uptime
              2⤵
              • Virtualization/Sandbox Evasion: Time Based Evasion
              • Reads CPU attributes
              PID:1607
            • /usr/bin/free
              free -m
              2⤵
              • Reads CPU attributes
              • Reads runtime system information
              PID:1608
            • /usr/bin/uptime
              uptime
              2⤵
              • Virtualization/Sandbox Evasion: Time Based Evasion
              • Reads CPU attributes
              PID:1609
            • /usr/bin/free
              free -m
              2⤵
              • Reads CPU attributes
              PID:1610
            • /usr/bin/uptime
              uptime
              2⤵
              • Virtualization/Sandbox Evasion: Time Based Evasion
              • Reads CPU attributes
              PID:1611
            • /usr/bin/free
              free -m
              2⤵
              • Reads CPU attributes
              PID:1612
            • /usr/bin/uptime
              uptime
              2⤵
              • Virtualization/Sandbox Evasion: Time Based Evasion
              • Reads CPU attributes
              • Reads runtime system information
              PID:1613
            • /usr/bin/free
              free -m
              2⤵
              • Reads CPU attributes
              • Reads runtime system information
              PID:1614
            • /usr/bin/uptime
              uptime
              2⤵
              • Virtualization/Sandbox Evasion: Time Based Evasion
              • Reads CPU attributes
              • Reads runtime system information
              PID:1615
            • /usr/bin/free
              free -m
              2⤵
              • Reads CPU attributes
              PID:1619
            • /usr/bin/uptime
              uptime
              2⤵
              • Virtualization/Sandbox Evasion: Time Based Evasion
              • Reads CPU attributes
              PID:1620
            • /usr/bin/free
              free -m
              2⤵
              • Reads CPU attributes
              PID:1621
            • /usr/bin/uptime
              uptime
              2⤵
              • Virtualization/Sandbox Evasion: Time Based Evasion
              • Reads CPU attributes
              • Reads runtime system information
              PID:1622
            • /usr/bin/free
              free -m
              2⤵
              • Reads CPU attributes
              PID:1623
            • /usr/bin/uptime
              uptime
              2⤵
              • Virtualization/Sandbox Evasion: Time Based Evasion
              • Reads CPU attributes
              • Reads runtime system information
              PID:1624

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • /tmp/The-MALWARE-Repo-master/Botnets/FritzFrog/nc

            Filesize

            8.7MB

            MD5

            aa55272ad8db954381a8eab889f087cf

            SHA1

            d7df26bf57530c0475247b0f3335e5d19d9cb30d

            SHA256

            d1e82d4a37959a9e6b661e31b8c8c6d2813c93ac92508a2771b2491b04ea2485

            SHA512

            5590c039eb50708fe8fe417a5b5adf1d9019db0590dee119d0907bb588114bcbeb980c5ec7f3f77e85aefcbba76c1560e8b81069434ef5774ca60b1e28dbac20